IT Management  >   Systems Operations  >   Security  >  

Web Security

RSS Feed    Add to Google    Add to My Yahoo!
Web Security White Papers (View All Report Types)
 
Advanced Session Security
sponsored by CA Technologies
WHITE PAPER: Surveys show that IT security experts have identified session hijacking as one of the top three security risks. Access this white paper and uncover details on two highly successful methods for enhancing session security.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

CA Technologies

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Controlling Web 2.0 Applications in the Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market
sponsored by Webroot
WHITE PAPER: This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.
Posted: 25 Jul 2011 | Published: 01 Dec 2010

Webroot

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk
sponsored by Websense, Inc.
WHITE PAPER: Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

AVG Technologies USA, Inc.

Malicious JavaScript Attacks: What Can You Do?
sponsored by Sophos, Inc.
WHITE PAPER: We’ll review what to watch for, as well as the security strategies that will help keep you safe.
Posted: 12 Jan 2011 | Published: 11 Jan 2011

Sophos, Inc.

Putting Web Threat Protection and Content Filtering in the Cloud
sponsored by Webroot
WHITE PAPER: In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.
Posted: 05 Feb 2013 | Published: 31 Dec 2012

Webroot

Escalating Targeted Web and Email Attacks
sponsored by M86 Security UK
WHITE PAPER: Today's cybercriminals are more dangerous and sophisticated than ever before, launching more targeted attacks for bigger payoffs. And with new emerging technologies, also come new ways of exploitation. In this resource, explore the growing issue of targeted web and email threats and discover a unique approach to mitigating them.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

M86 Security UK
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement